@@ -1379,31 +1379,31 @@ func BenchmarkHandshakeServer(b *testing.B) {
1379
1379
})
1380
1380
b .Run ("ECDHE-P256-RSA" , func (b * testing.B ) {
1381
1381
b .Run ("TLSv13" , func (b * testing.B ) {
1382
- benchmarkHandshakeServer (b , VersionTLS13 , TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1382
+ benchmarkHandshakeServer (b , VersionTLS13 , TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1383
1383
CurveP256 , testRSACertificate , testRSAPrivateKey )
1384
1384
})
1385
1385
b .Run ("TLSv12" , func (b * testing.B ) {
1386
- benchmarkHandshakeServer (b , VersionTLS12 , TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1386
+ benchmarkHandshakeServer (b , VersionTLS12 , TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1387
1387
CurveP256 , testRSACertificate , testRSAPrivateKey )
1388
1388
})
1389
1389
})
1390
1390
b .Run ("ECDHE-P256-ECDSA-P256" , func (b * testing.B ) {
1391
1391
b .Run ("TLSv13" , func (b * testing.B ) {
1392
- benchmarkHandshakeServer (b , VersionTLS13 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 ,
1392
+ benchmarkHandshakeServer (b , VersionTLS13 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ,
1393
1393
CurveP256 , testP256Certificate , testP256PrivateKey )
1394
1394
})
1395
1395
b .Run ("TLSv12" , func (b * testing.B ) {
1396
- benchmarkHandshakeServer (b , VersionTLS12 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 ,
1396
+ benchmarkHandshakeServer (b , VersionTLS12 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ,
1397
1397
CurveP256 , testP256Certificate , testP256PrivateKey )
1398
1398
})
1399
1399
})
1400
1400
b .Run ("ECDHE-X25519-ECDSA-P256" , func (b * testing.B ) {
1401
1401
b .Run ("TLSv13" , func (b * testing.B ) {
1402
- benchmarkHandshakeServer (b , VersionTLS13 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 ,
1402
+ benchmarkHandshakeServer (b , VersionTLS13 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ,
1403
1403
X25519 , testP256Certificate , testP256PrivateKey )
1404
1404
})
1405
1405
b .Run ("TLSv12" , func (b * testing.B ) {
1406
- benchmarkHandshakeServer (b , VersionTLS12 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 ,
1406
+ benchmarkHandshakeServer (b , VersionTLS12 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ,
1407
1407
X25519 , testP256Certificate , testP256PrivateKey )
1408
1408
})
1409
1409
})
@@ -1412,11 +1412,11 @@ func BenchmarkHandshakeServer(b *testing.B) {
1412
1412
b .Fatal ("test ECDSA key doesn't use curve P-521" )
1413
1413
}
1414
1414
b .Run ("TLSv13" , func (b * testing.B ) {
1415
- benchmarkHandshakeServer (b , VersionTLS13 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 ,
1415
+ benchmarkHandshakeServer (b , VersionTLS13 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ,
1416
1416
CurveP521 , testECDSACertificate , testECDSAPrivateKey )
1417
1417
})
1418
1418
b .Run ("TLSv12" , func (b * testing.B ) {
1419
- benchmarkHandshakeServer (b , VersionTLS12 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 ,
1419
+ benchmarkHandshakeServer (b , VersionTLS12 , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ,
1420
1420
CurveP521 , testECDSACertificate , testECDSAPrivateKey )
1421
1421
})
1422
1422
})
@@ -1792,28 +1792,28 @@ func TestAESCipherReordering(t *testing.T) {
1792
1792
{
1793
1793
name : "server has hardware AES, client doesn't (pick ChaCha)" ,
1794
1794
clientCiphers : []uint16 {
1795
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1795
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1796
1796
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
1797
1797
TLS_RSA_WITH_AES_128_CBC_SHA ,
1798
1798
},
1799
1799
serverHasAESGCM : true ,
1800
- expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1800
+ expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1801
1801
},
1802
1802
{
1803
1803
name : "client prefers AES-GCM, server doesn't have hardware AES (pick ChaCha)" ,
1804
1804
clientCiphers : []uint16 {
1805
1805
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
1806
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1806
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1807
1807
TLS_RSA_WITH_AES_128_CBC_SHA ,
1808
1808
},
1809
1809
serverHasAESGCM : false ,
1810
- expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1810
+ expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1811
1811
},
1812
1812
{
1813
1813
name : "client prefers AES-GCM, server has hardware AES (pick AES-GCM)" ,
1814
1814
clientCiphers : []uint16 {
1815
1815
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
1816
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1816
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1817
1817
TLS_RSA_WITH_AES_128_CBC_SHA ,
1818
1818
},
1819
1819
serverHasAESGCM : true ,
@@ -1824,7 +1824,7 @@ func TestAESCipherReordering(t *testing.T) {
1824
1824
clientCiphers : []uint16 {
1825
1825
0x0A0A , // GREASE value
1826
1826
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
1827
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1827
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1828
1828
TLS_RSA_WITH_AES_128_CBC_SHA ,
1829
1829
},
1830
1830
serverHasAESGCM : true ,
@@ -1845,27 +1845,27 @@ func TestAESCipherReordering(t *testing.T) {
1845
1845
clientCiphers : []uint16 {
1846
1846
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
1847
1847
TLS_RSA_WITH_AES_128_CBC_SHA ,
1848
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1848
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1849
1849
},
1850
1850
serverHasAESGCM : false ,
1851
- expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1851
+ expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1852
1852
},
1853
1853
{
1854
1854
name : "client prefers AES-GCM over ChaCha and sends GREASE, server doesn't have hardware AES (pick ChaCha)" ,
1855
1855
clientCiphers : []uint16 {
1856
1856
0x0A0A , // GREASE value
1857
1857
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
1858
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1858
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1859
1859
TLS_RSA_WITH_AES_128_CBC_SHA ,
1860
1860
},
1861
1861
serverHasAESGCM : false ,
1862
- expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1862
+ expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1863
1863
},
1864
1864
{
1865
1865
name : "client supports multiple AES-GCM, server doesn't have hardware AES and doesn't support ChaCha (AES-GCM)" ,
1866
1866
clientCiphers : []uint16 {
1867
1867
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ,
1868
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1868
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1869
1869
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
1870
1870
},
1871
1871
serverHasAESGCM : false ,
@@ -1879,14 +1879,14 @@ func TestAESCipherReordering(t *testing.T) {
1879
1879
name : "client prefers AES-GCM, server has hardware but doesn't support AES (pick ChaCha)" ,
1880
1880
clientCiphers : []uint16 {
1881
1881
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
1882
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1882
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1883
1883
TLS_RSA_WITH_AES_128_CBC_SHA ,
1884
1884
},
1885
1885
serverHasAESGCM : true ,
1886
1886
serverCiphers : []uint16 {
1887
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1887
+ TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1888
1888
},
1889
- expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ,
1889
+ expectedCipher : TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ,
1890
1890
},
1891
1891
}
1892
1892
0 commit comments